Remote control of your mobile phone

Source: Internet
Author: User
Tags android push notification

Remote control of your mobile phone
The AVL mobile security team recently discovered a method to steal user privacy by using the lightweight web Server jetty. by visiting a specific url in a browser, you can obtain user privacy information.

Working Method:

After setting the jetty server on the target mobile phone, you can request a specific URL through a browser to obtain resources on the target mobile phone, including privacy information.

The architecture is as follows:

Url path for retrieving user privacy information:

After the trojan turns the target mobile phone into a server, it uses a url request to obtain any resources on the mobile phone, resulting in user privacy leakage. This method is more unique and concealed.
 

The AVL mobile team recently discovered a remote control spyware program that uses Androidpn push commands. The program disguised as a system application and induces users to activate the Device Manager, upload private information such as call records, call recordings, Environment recordings, contacts, text message boxes, and geographic locations based on the commands obtained by the push, you can also modify text message box content, send private text messages, intercept text messages, Block incoming calls, and perform other operations to steal user privacy and affect the normal experience of mobile phones.

Android push notification principle (derived from the Androidpn Interface ):

Push messages to the user's mobile client (from the Androidpn Interface ):

Log on to the xmpp server and obtain the message command (from the Androidpn Interface ):

Remote control module process:

In addition, the app can receive commands and modify and replace the content in the text box without authorization ..

This sample uses a rare Androidpn push method to obtain instructions, which is relatively more concealed. In addition, multiple types of private information are stolen, especially the function of modifying text message boxes. Users can download and install AVL Pro to detect and kill such Trojans. AVL Pro provides real-time protection to help you get rid of viruses and create a good mobile phone environment.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.